Skip to Main Content
Our Guides

ICPSR: Find & Use Data

Application Requirements

Information about applying for access to restricted-use data is available on the home page of each study within the Notes section. Secure download and VDE studies have an online application process, and users must log in to the online application system using an ICPSR MyData account or their Facebook, Google, ORCiD, or LinkedIn passwords. Physical Enclave studies have a paper application which can be downloaded from the study home page. The application requirements for the different restricted data types are as follows:

  1. Secure download

Investigator information: Includes name, contact information, and institutional affiliation of the principal investigator. In most cases, the principal investigator must have a Ph.D., J.D., or M.D. degree and be affiliated with an academic or research institution.

Research staff information: Includes name, contact information, institutional affiliation, and computer make and model of all research staff members who will access the data. All research staff members must be affiliated with the same institution as the Investigator.

Research description: Applicants will submit a research description which includes a description of the research project that the data will be used for and clear information about why these specific data are being requested. If multiple restricted studies or series are being requested, applicants should explain why each study or series is required.

Confidential Data Security Plan: Applicants will select a confidential data security plan and agree to all terms included therein. The fundamental goals of this plan are to ensure that the restricted data are stored securely and are accessible only to the people listed in the application. ICPSR offers three confidential data security plans for secure download data: External hard drivenon-networked computer, and private-networked computer.

Restricted Data Use Agreement: Applicants must submit a Restricted Data Use Agreement. This is an agreement between the University of Michigan and the investigator’s institution, signed by both the investigator and a legal representative of the investigator’s institution, which specifies the terms of use of the restricted data.

IRB approval or exemption: Applicants must provide documentation of IRB approval or exemption for the proposed research project.

Other requirements: Some restricted data have additional requirements, such as obtaining special certifications or filling out additional forms.

  1. Virtual Data Enclave and Physical Data Enclave

Application requirements for data in the VDE and PDE are mostly the same as those for Secure Download, with the following exceptions:

Confidential Data Security Plan: Applicants are not required to select a data security plan, but rather must agree and adhere to the security terms found in the Restricted Data Use Agreement.

Other requirements: Applicants must submit CVs for all researchers who will need access to the data for the proposed research project.

  1. Restricted Survey Documentation and Analysis (SDA):

Application requirements for restricted SDA data are mostly the same as those for Secure Download, with some exceptions, which are outlined in the online application.

Application Review and Approval Process

TLDR: ICPSR can take up to 4 weeks to review an application, or longer if it is incorrectly filled out

After an application is submitted, it is reviewed by ICPSR staff. The amount of time it takes to review an application depends on whether and how many changes are required before approval. ICPSR staff will work with the requester until all required information is provided and the request can be approved. Generally, it takes 2-4 weeks for an application to be approved after it is submitted.

Application Maintenance

After an application is approved, it is the Investigator’s responsibility to make sure the application remains up-to-date during the data access period. This may include the following actions:

  1. Adding or Removing Research Staff
  2. Requesting Additional Data
  3. Uploading updated IRB Documentation when the project’s IRB approval has expired
  4. Submitting Annual Reports
  5. Submitting a Data Destruction Affidavit or a Request for Renewal when the data access period has ended